Joshua CaseyK8s mTLS Auth with TLS PassthroughIt’s well known that the default way to authenticate with a Kubernetes cluster uses mTLS to authenticate an API call.5 min read·Jun 22, 2023--1--1
Joshua CaseyPresenting an easy OIDC CLIFind yourself in need of a CLI to retrieve an id_token? Or perhaps you just want to quickly check whether a client is configured correctly…2 min read·Nov 15, 2022----
Joshua CaseyHow to browse the web (a little) more securelyOver the past few years I’ve accumulated a few tips and tricks to keep my browsing private. Quite a few parties may have access to your…6 min read·Mar 18, 2022----
Joshua CaseyHow to connect Okta SAML and Spring Boot using saml2Login, part 2This is the second article in the series. For the first article, visit here.4 min read·Dec 29, 2020----
Joshua CaseyPassword-Hashing-As-A-ServicePHAAS? What acronyms you get when everything is as a service4 min read·Dec 3, 2020--1--1
Joshua CaseyExtension Points in KubernetesUse Case: I want to prevent creation of a resource that does not meet standard.3 min read·Dec 2, 2020----
Joshua CaseyHow to connect Okta SAML and Spring Boot using saml2Login, part 1If you have a Spring Boot app, chances are you want to allow users to easily login to that app. Here I’ll show you how to use Okta as a…6 min read·Oct 29, 2020----
Joshua CaseyLeadership lessons from the homeDuring the past few months I’ve been fortunate to spend a good deal of time with my family. I’ve noticed a few patterns with the kids —…3 min read·Sep 12, 2020----
Joshua CaseyHow to verify UAA Tokens, part 2 — “Offline Validation”In part 1 [1] I discussed a strategy that we call “online validation” of tokens, by calling the UAA’s /introspect [2] endpoint and passing…4 min read·Apr 18, 2020--1--1